Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Ethical Hacker Exam Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
One way to get more information about the target system is to look at what the webserver is, as well as the operating system. One important tool that can be used to gather web site intelligence is Wappalyzer. Which of the following sentences is true about Wappalyzer?
Correct
Wappalyzer is a technology profiler that shows you what websites are built with. It is more than a CMS detector or framework detector; it provides information about the webserver, programming frameworks, ad networks, and tracking technology.
Incorrect
Wappalyzer is a technology profiler that shows you what websites are built with. It is more than a CMS detector or framework detector; it provides information about the webserver, programming frameworks, ad networks, and tracking technology.
-
Question 2 of 10
2. Question
A ping sweep is a technique used to identify if the hosts are alive in the networks using their IP addresses. Many tools can perform a ping sweep; one of the common ones is fping. Which of the following statements best defines fping?
Correct
Fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. Fping differs from ping in that you can specify any number of targets on the command-line, or specify a file containing the lists of targets to ping.
Incorrect
Fping is a program like ping which uses the Internet Control Message Protocol (ICMP) echo request to determine if a target host is responding. Fping differs from ping in that you can specify any number of targets on the command-line, or specify a file containing the lists of targets to ping.
-
Question 3 of 10
3. Question
Transmission Control Protocol (TCP) scanning is the most detailed and complex type of port scanning. There are different types of TCP scans that Nmap can perform, one of which is the SYN scan. Which of the following sentences best describes the SYN scan?
Correct
SYN scan is also called a half-open scan because connections are left half-open. During this scan, Nmap will send an SYN message to the target. If the port is open, it responds with an SYN/ACK message, and Nmap will respond to that with an RST message, indicating it doesn’t want to continue with the connection. If the port is closed, the target system will respond with its RST message.
Incorrect
SYN scan is also called a half-open scan because connections are left half-open. During this scan, Nmap will send an SYN message to the target. If the port is open, it responds with an SYN/ACK message, and Nmap will respond to that with an RST message, indicating it doesn’t want to continue with the connection. If the port is closed, the target system will respond with its RST message.
-
Question 4 of 10
4. Question
Nmap contains a variety of functionality, one of which is a scripting engine, which allows a Nmap user to extend the functionality in any way he or she would like. If you’re using a Linux system, where can you find all of the installed Nmap scripts?
Correct
On a Linux system, you can find all of the installed scripts in /usr/share/nmap/scripts. On a Windows system, you can find the scripts in the Program Files directory where Nmap is installed. The file extension for these scripts is .nse for the Nmap scripting engine. Scripts are written in the Lua language, and each file can be opened and read, possibly to get details about the function of the script.
Incorrect
On a Linux system, you can find all of the installed scripts in /usr/share/nmap/scripts. On a Windows system, you can find the scripts in the Program Files directory where Nmap is installed. The file extension for these scripts is .nse for the Nmap scripting engine. Scripts are written in the Lua language, and each file can be opened and read, possibly to get details about the function of the script.
-
Question 5 of 10
5. Question
Vulnerability scanning is the inspection of the potential points of exploitation on a computer or network to identify security holes. There are four categories of vulnerabilities, one of which is the true positive. Which of the following statements defines true positive?
Correct
The four categories of vulnerability include the following:
(1) False-positive wherein the scanner has identified something it believes to be a vulnerability. After investigation, it turns out it’s not a vulnerability.
(2) False-negative wherein the scanner has not identified a vulnerability. It later turns out that there was a vulnerability that the scanner missed.
(3) True positive wherein the scanner has identified a vulnerability, and after manual investigation, it turns out to be a legitimate vulnerability.
(4) True negative wherein the scanner has not identified a vulnerability, and there is not a vulnerability to identify.Incorrect
The four categories of vulnerability include the following:
(1) False-positive wherein the scanner has identified something it believes to be a vulnerability. After investigation, it turns out it’s not a vulnerability.
(2) False-negative wherein the scanner has not identified a vulnerability. It later turns out that there was a vulnerability that the scanner missed.
(3) True positive wherein the scanner has identified a vulnerability, and after manual investigation, it turns out to be a legitimate vulnerability.
(4) True negative wherein the scanner has not identified a vulnerability, and there is not a vulnerability to identify. -
Question 6 of 10
6. Question
Enumeration is about determining what services are running and then extracting information from those services. There are a variety of protocols and tools that you would use during enumeration. For a start, there is the Server Message Block (SMB) protocol. Which of the following statements best defines SMB?
Correct
The Server Message Block Protocol (SMB) is a client-server communication protocol used on Windows systems for file and resource sharing, as well as some remote management. It can also carry transaction protocols for interprocess communication.
Incorrect
The Server Message Block Protocol (SMB) is a client-server communication protocol used on Windows systems for file and resource sharing, as well as some remote management. It can also carry transaction protocols for interprocess communication.
-
Question 7 of 10
7. Question
The Metasploit Project is an open-source project that provides a public resource for researching security vulnerabilities and developing code that allows a network administrator to break into his own network to identify security risks and document which vulnerabilities need to be addressed first. This tool is useful in enumeration, and when it comes to SMB, there are several commands that you can run. If you want to check the SMB service that’s running in the system, which command will you use?
Correct
If you want to check the Server Message Block (SMB) services running in the target system, you can use this command: msf auxiliary(scanner/smb/smb_version) > run
Incorrect
If you want to check the Server Message Block (SMB) services running in the target system, you can use this command: msf auxiliary(scanner/smb/smb_version) > run
-
Question 8 of 10
8. Question
What is this database created by the Offensive Security (an information security training company), which is defined as an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers?
Correct
The Exploit Database is a site where researchers and developers post exploit code and proof of concept code that works against identified vulnerabilities. They aim to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources and present them in a freely-available and easy-to-navigate database.
Incorrect
The Exploit Database is a site where researchers and developers post exploit code and proof of concept code that works against identified vulnerabilities. They aim to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources and present them in a freely-available and easy-to-navigate database.
-
Question 9 of 10
9. Question
Once you have an exploited system, you will want to start gathering information in it. John the Ripper is one of the useful tools that can be used in obtaining passwords in a system. Which of the following statements is not true about John the Ripper?
Correct
John the Ripper (JtR) is an offline password cracking tool originally produced for UNIX-based systems. It was designed to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary attacks. It uses the single crack mode to take information from the different fields in the file, applying mangling rules to them, to try as passwords.
Incorrect
John the Ripper (JtR) is an offline password cracking tool originally produced for UNIX-based systems. It was designed to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary attacks. It uses the single crack mode to take information from the different fields in the file, applying mangling rules to them, to try as passwords.
-
Question 10 of 10
10. Question
Malware refers to software programs designed to damage and to do other unwanted actions on a computer system. There are several examples of malware, one of which is a virus. Which of the following sentences defines a virus?
Correct
A virus requires user intervention to infect a system. Once that happens, the virus will infect the system, possibly by injecting code into other programs, so when those programs run, the virus still retains control of the infected system. Every time the infected programs are run, the system will get reinfected, even if the original executable and process are removed.
Incorrect
A virus requires user intervention to infect a system. Once that happens, the virus will infect the system, possibly by injecting code into other programs, so when those programs run, the virus still retains control of the infected system. Every time the infected programs are run, the system will get reinfected, even if the original executable and process are removed.